A user able to connect to Agent 2 can inject an Oracle TNS connection string via the 'service' parameter. This can lead to Agent 2 connecting to an attacker-controlled server and leaking Oracle database credentials if they are saved in a named session.
Advisories
No advisories yet.
Fixes
Solution
Update the affected components to their respective fixed versions.
Workaround
Don't use named sessions for Oracle database monitoring.
References
| Link | Providers |
|---|---|
| https://support.zabbix.com/browse/ZBX-27759 |
|
History
Wed, 06 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zabbix
Zabbix zabbix |
|
| Vendors & Products |
Zabbix
Zabbix zabbix |
Wed, 06 May 2026 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A user able to connect to Agent 2 can inject an Oracle TNS connection string via the 'service' parameter. This can lead to Agent 2 connecting to an attacker-controlled server and leaking Oracle database credentials if they are saved in a named session. | |
| Title | Agent 2 Oracle plugin TNS connection string injection via the 'service' parameter | |
| Weaknesses | CWE-522 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2026-05-06T06:59:42.854Z
Reserved: 2026-01-19T14:02:54.327Z
Link: CVE-2026-23927
No data.
Status : Received
Published: 2026-05-06T08:16:02.940
Modified: 2026-05-06T08:16:02.940
Link: CVE-2026-23927
No data.
OpenCVE Enrichment
Updated: 2026-05-06T08:30:25Z
Weaknesses